General
-
Target
NEAS.f500816077e04e2765953f13c92cdc10.exe
-
Size
2.6MB
-
Sample
231115-fnpj1sce56
-
MD5
f500816077e04e2765953f13c92cdc10
-
SHA1
291c5f984c339ba9b498a0d06f7c85ec7dd04cf8
-
SHA256
47e05db7c8d972be5e04866381689e41d53601259bc229247ac78001516a1319
-
SHA512
93611fc45eae013bbc5bad7fd110bd745634b8d37b9c749adf3ff0493a127d77c796768ec1a642dbd2b41fb617f19e643bd39ab780b9debc2736f31df40ba750
-
SSDEEP
49152:lS5IvAG44oOCdcSzNIJG70V6Do4yV/5mc5aNZJ350zg5bEJ60IZGnpw/Yr:lS5G4DOT5JGIVzh/5aZX0zgd0IZGpwG
Behavioral task
behavioral1
Sample
NEAS.f500816077e04e2765953f13c92cdc10.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.f500816077e04e2765953f13c92cdc10.exe
Resource
win10v2004-20231023-en
Malware Config
Targets
-
-
Target
NEAS.f500816077e04e2765953f13c92cdc10.exe
-
Size
2.6MB
-
MD5
f500816077e04e2765953f13c92cdc10
-
SHA1
291c5f984c339ba9b498a0d06f7c85ec7dd04cf8
-
SHA256
47e05db7c8d972be5e04866381689e41d53601259bc229247ac78001516a1319
-
SHA512
93611fc45eae013bbc5bad7fd110bd745634b8d37b9c749adf3ff0493a127d77c796768ec1a642dbd2b41fb617f19e643bd39ab780b9debc2736f31df40ba750
-
SSDEEP
49152:lS5IvAG44oOCdcSzNIJG70V6Do4yV/5mc5aNZJ350zg5bEJ60IZGnpw/Yr:lS5G4DOT5JGIVzh/5aZX0zgd0IZGpwG
Score10/10-
Modifies visiblity of hidden/system files in Explorer
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Virtualization/Sandbox Evasion
1